Search results for: delay tolerant networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3619

Search results for: delay tolerant networks

739 Vehicle Routing Problem Considering Alternative Roads under Triple Bottom Line Accounting

Authors: Onur Kaya, Ilknur Tukenmez

Abstract:

In this study, we consider vehicle routing problems on networks with alternative direct links between nodes, and we analyze a multi-objective problem considering the financial, environmental and social objectives in this context. In real life, there might exist several alternative direct roads between two nodes, and these roads might have differences in terms of their lengths and durations. For example, a road might be shorter than another but might require longer time due to traffic and speed limits. Similarly, some toll roads might be shorter or faster but require additional payment, leading to higher costs. We consider such alternative links in our problem and develop a mixed integer linear programming model that determines which alternative link to use between two nodes, in addition to determining the optimal routes for different vehicles, depending on the model objectives and constraints. We consider the minimum cost routing as the financial objective for the company, minimizing the CO2 emissions and gas usage as the environmental objectives, and optimizing the driver working conditions/working hours, and minimizing the risks of accidents as the social objectives. With these objective functions, we aim to determine which routes, and which alternative links should be used in addition to the speed choices on each link. We discuss the results of the developed vehicle routing models and compare their results depending on the system parameters.

Keywords: vehicle routing, alternative links between nodes, mixed integer linear programming, triple bottom line accounting

Procedia PDF Downloads 388
738 Seaworthiness and Liability Risks Involving Technology and Cybersecurity in Transport and Logistics

Authors: Eugene Wong, Felix Chan, Linsey Chen, Joey Cheung

Abstract:

The widespread use of technologies and cyber/digital means for complex maritime operations have led to a sharp rise in global cyber-attacks. They have generated an increasing number of liability disputes, insurance claims, and legal proceedings. An array of antiquated case law, regulations, international conventions, and obsolete contractual clauses drafted in the pre-technology era have become grossly inadequate in addressing the contemporary challenges. This paper offers a critique of the ambiguity of cybersecurity liabilities under the obligation of seaworthiness entailed in the Hague-Visby Rules, which apply either by law in a large number of jurisdictions or by express incorporation into the shipping documents. This paper also evaluates the legal and technological criteria for assessing whether a vessel is properly equipped with the latest offshore technologies for navigation and cargo delivery operations. Examples include computer applications, networks and servers, enterprise systems, global positioning systems, and data centers. A critical analysis of the carriers’ obligations to exercise due diligence in preventing or mitigating cyber-attacks is also conducted in this paper. It is hoped that the present study will offer original and crucial insights to policymakers, regulators, carriers, cargo interests, and insurance underwriters closely involved in dispute prevention and resolution arising from cybersecurity liabilities.

Keywords: seaworthiness, cybersecurity, liabilities, risks, maritime, transport

Procedia PDF Downloads 116
737 Geopolitical Implications and the Role of LinkedIn in the Russo-Ukrainian War: A Comprehensive Analysis of Social Media in Crisis Situations

Authors: Amber Brittain-Hale

Abstract:

This research investigates the evolving role of social media in crisis situations by employing discourse analysis methodology and honing in on the Russo-Ukrainian War, particularly Ukraine's use of LinkedIn. The study posits that social media platforms, such as LinkedIn, play a crucial role in shaping communication, disseminating information, and influencing geopolitical strategies during conflicts. Focusing on Ukraine's official state account on LinkedIn and analyzing its posts and interactions, the research aims to unveil discourse dynamics in high-stakes scenarios and provide valuable insights for leaders navigating complex global challenges. A comprehensive analysis of the data will contribute to a deeper understanding of the tactics adopted by political leaders in managing communication, the bidirectional nature of discourse provided by online social networks, and the rapid advancement of technology that has led to the growing significance of social media platforms in crisis situations. Through this approach, the geopolitical factors that influenced the country's social media strategy during the Russo-Ukrainian War will be illuminated, offering a broader perspective on the role of social media in such challenging times. Ultimately, the study seeks to uncover lessons that can be drawn from Ukraine's LinkedIn approach, informing future strategies for utilizing social media during crises and advancing the understanding of how social media can be harnessed to address intricate global issues.

Keywords: russo-ukrainian war, social media, crisis, discourse analysis

Procedia PDF Downloads 93
736 Improving the Efficiency of Wheat and Triticale Androgenesis: Ultrastructural and Transcriptomic Study

Authors: M. Szechynska-Hebda, M. Sobczak, E. Rozanska, J. Troczynska, Z. Banaszak, N. Hordyńska, M. Dyda, M. Wedzony

Abstract:

Chloroplasts, as essential organelles for photosynthesis, play a critical role in plant development. However, disturbances in the proper functioning of chloroplasts, in the extreme case manifesting as albinism of tissues and whole plants, are a phenomenon often occurring in conditions deviating from natural (e.g., in vitro cultures applied in breeding programs). Using whole-transcriptome analysis (RNA-Seq) together with light, fluorescent and electron microscopy, it was shown, that development of chloroplasts and formation of green or albino plants in the androgenesis process are genotype-dependent; however, they could be modulated by sub-optimal temperature treatment. The reprogramming of the microspore development from gametophytic to sporophytic, and then regeneration of green plant can be positively regulated by cold stress (4 ⁰C). A high temperature stress (32 ⁰C) can induce androgenesis, but it is a factor negatively influencing green plant regeneration (promoting albinism). A similar effect on microspores, androgenesis, and subsequent chloroplast formation, is elicited as a result of postponing the date of spike collection from spring to summer in field conditions (natural temperature rise). It is determined in both environmental or genotypic manner. The delay of the sowing date (environmental effect) or growing of late genotypes (genotypic effect) result in spike maturation at higher temperatures and significantly enhance albino plant formation in androgenesis process. Such a temperature system (4 ⁰C vs. 32 ⁰C) was used to study the chloroplast biogenesis process in wheat and triticale. It was shown, that efficiency of physiological processes differentiates microspore development during cold reprograming in genotypes susceptible and resistant to androgenesis. Moreover, a great variation in developmental stages of the microspores in one anther is observed for susceptible genotypes. Microspores that are more physiologically active under cold conditions can activate signaling pathways and processes, which provide an appropriate supply of metabolites to cell compartments. This, in turn, fully correlates with the genotype-dependent efficiency of chloroplast formation (or different types of plastid) at particular steps of androgenesis. The effect obtained after applying a high temperature stress is different. High temperature causes a significant acceleration of microspore development and less variation in developmental stages at the end of the treatment. Therefore, the developmental diversity of the microspores in one anther seems to be a critical factor for subsequent cell and chloroplast differentiation. The work was financed by Ministry of Agriculture and Rural Development within Program: 'Biological Progress in Plant Production', project no HOR.hn.802.15.2018

Keywords: androgenesis, chloroplast biogenesis, temperature stress, wheat

Procedia PDF Downloads 134
735 The Community Stakeholders’ Perspectives on Sexual Health Education for Young Adolescents in Western New York, USA: A Qualitative Descriptive Study

Authors: Sadandaula Rose Muheriwa Matemba, Alexander Glazier, Natalie M. LeBlanc

Abstract:

In the United States, up to 10% of girls and 22 % of boys 10-14 years have had sex, 5% of them had their first sex before 11 years, and the age of first sexual encounter is reported to be 8 years. Over 4,000 adolescent girls, 10-14 years, become pregnant every year, and 2.6% of the abortions in 2019 were among adolescents below 15 years. Despite these negative outcomes, little research has been conducted to understand the sexual health education offered to young adolescents ages 10-14. Early sexual health education is one of the most effective strategies to help lower the rate of early pregnancies, HIV infections, and other sexually transmitted. Such knowledge is necessary to inform best practices for supporting the healthy sexual development of young adolescents and prevent adverse outcomes. This qualitative descriptive study was conducted to explore the community stakeholders’ experiences in sexual health education for young adolescents ages 10-14 and ascertain the young adolescents’ sexual health support needs. Maximum variation purposive sampling was used to recruit a total sample of 13 community stakeholders, including health education teachers, members of youth-based organizations, and Adolescent Clinic providers in Rochester, New York State, in the United States of America from April to June 2022. Data were collected through semi-structured individual in-depth interviews and were analyzed using MAXQDA following a conventional content analysis approach. Triangulation, team analysis, and respondent validation to enhance rigor were also employed to enhance study rigor. The participants were predominantly female (92.3%) and comprised of Caucasians (53.8%), Black/African Americans (38.5%), and Indian-American (7.7%), with ages ranging from 23-59. Four themes emerged: the perceived need for early sexual health education, preferred timing to initiate sexual health conversations, perceived age-appropriate content for young adolescents, and initiating sexual health conversations with young adolescents. The participants described encouraging and concerning experiences. Most participants were concerned that young adolescents are living in a sexually driven environment and are not given the sexual health education they need, even though they are open to learning sexual health materials. There was consensus on the need to initiate sexual health conversations early at 4 years or younger, standardize sexual health education in schools and make age-appropriate sexual health education progressive. These results show that early sexual health education is essential if young adolescents are to delay sexual debut, prevent early pregnancies, and if the goal of ending the HIV epidemic is to be achieved. However, research is needed on a larger scale to understand how best to implement sexual health education among young adolescents and to inform interventions for implementing contextually-relevant sexuality education for this population. These findings call for increased multidisciplinary efforts in promoting early sexual health education for young adolescents.

Keywords: community stakeholders’ perspectives, sexual development, sexual health education, young adolescents

Procedia PDF Downloads 66
734 Radioprotective Efficacy of Costus afer against the Radiation-Induced Hematology and Histopathology Damage in Mice

Authors: Idowu R. Akomolafe, Naven Chetty

Abstract:

Background: The widespread medical application of ionizing radiation has raised public concern about radiation exposure and, thus, associated cancer risk. The production of reactive oxygen species and free radicals as a result of radiation exposure can cause severe damage to deoxyribonucleic acid (DNA) of cells, thus leading to biological effect. Radiotherapy is an excellent modality in the treatment of cancerous cells, comes with a few challenges. A significant challenge is the exposure of healthy cells surrounding the tumour to radiation. The last few decades have witnessed lots of attention shifted to plants, herbs, and natural product as an alternative to synthetic compound for radioprotection. Thus, the study investigated the radioprotective efficacy of Costus afer against whole-body radiation-induced haematological, histopathological disorder in mice. Materials and Method: Fifty-four mice were randomly divided into nine groups. Animals were pretreated with the extract of Costus afer by oral gavage for six days before irradiation. Control: 6 mice received feed and water only; 6 mice received feed, water, and 3Gy; 6 mice received feed, water, and 6Gy; experimental: 6 mice received 250 mg/kg extract; 6 mice received 500 mg/kg extract; 6 mice received 250 mg/kg extract and 3Gy; 6 mice received 500 mg/kg extract and 3Gy; 6 mice received 250 mg/kg extract and 6Gy; 6 mice received 500 mg/kg extract and 6Gy in addition to feeding and water. The irradiation was done at the Radiotherapy and Oncology Department of Grey's Hospital using linear accelerator (LINAC). Thirty-six mice were sacrificed by cervical dislocation 48 hours after irradiation, and blood was collected for haematology tests. Also, the liver and kidney of the sacrificed mice were surgically removed for histopathology tests. The remaining eighteen (18) mice were used for mortality and survival studies. Data were analysed by one-way ANOVA, followed by Tukey's multiple comparison test. Results: Prior administration of Costus afer extract decreased the symptoms of radiation sickness and caused a significant delay in the mortality as demonstrated in the experimental mice. The first mortality was recorded on day-5 post irradiation, and this happened to the group E- that is, mice that received 6Gy but no extract. There was significant protection in the experimental mice, as demonstrated in the blood counts against hematopoietic and gastrointestinal damage when compared with the control. The protection was seen in the increase in blood counts of experimental animals and the number of survivor. The protection offered by Costus afer may be due to its ability to scavenge free radicals and restore gastrointestinal and bone marrow damage produced by radiation. Conclusions: The study has demonstrated that exposure of mice to radiation could cause modifications in the haematological and histopathological parameters of irradiated mice. However, the changes were relieved by the methanol extract of Costus afer, probably through its free radical scavenging and antioxidant properties.

Keywords: costus afer, hematological, mortality, radioprotection, radiotherapy

Procedia PDF Downloads 122
733 Structural Health Monitoring of Offshore Structures Using Wireless Sensor Networking under Operational and Environmental Variability

Authors: Srinivasan Chandrasekaran, Thailammai Chithambaram, Shihas A. Khader

Abstract:

The early-stage damage detection in offshore structures requires continuous structural health monitoring and for the large area the position of sensors will also plays an important role in the efficient damage detection. Determining the dynamic behavior of offshore structures requires dense deployment of sensors. The wired Structural Health Monitoring (SHM) systems are highly expensive and always needs larger installation space to deploy. Wireless sensor networks can enhance the SHM system by deployment of scalable sensor network, which consumes lesser space. This paper presents the results of wireless sensor network based Structural Health Monitoring method applied to a scaled experimental model of offshore structure that underwent wave loading. This method determines the serviceability of the offshore structure which is subjected to various environment loads. Wired and wireless sensors were installed in the model and the response of the scaled BLSRP model under wave loading was recorded. The wireless system discussed in this study is the Raspberry pi board with Arm V6 processor which is programmed to transmit the data acquired by the sensor to the server using Wi-Fi adapter, the data is then hosted in the webpage. The data acquired from the wireless and wired SHM systems were compared and the design of the wireless system is verified.

Keywords: condition assessment, damage detection, structural health monitoring, structural response, wireless sensor network

Procedia PDF Downloads 255
732 Freedom of Speech and Involvement in Hatred Speech on Social Media Networks

Authors: Sara Chinnasamy, Michelle Gun, M. Adnan Hashim

Abstract:

Federal Constitution guarantees Malaysians the right to free speech and expression; yet hatred speech can be commonly found on social media platforms such as Facebook, Twitter, and Instagram. In Malaysia social media sphere, most hatred speech involves religion, race and politics. Recent cases of racial attacks on social media have created social tensions among Malaysians. Many Malaysians always argue on their rights to freedom of speech. However, there are laws that limit their expression to the public and protecting social media users from being a victim of hate speech. This paper aims to explore the attitude and involvement of Malaysian netizens towards freedom of speech and hatred speech on social media. It also examines the relationship between involvement in hatred speech among Malaysian netizens and attitude towards freedom of speech. For most Malaysians, practicing total freedom of speech in the open is unthinkable. As a result, the best channel to articulate their feelings and opinions liberally is the internet. With the advent of the internet medium, more and more Malaysians are conveying their viewpoints using the various internet channels although sensitivity of the audience is seldom taken into account. Consequently, this situation has led to pockets of social disharmony among the citizens. Although this unhealthy activity is denounced by the authority, netizens are generally of the view that they have the right to write anything they want. Using the quantitative method, survey was conducted among Malaysians aged between 18 and 50 years who are active social media users. Results from the survey reveal that despite a weak relationship level between hatred speech involvement on social media and attitude towards freedom of speech, the association is still considerably significant. As such, it can be safely presumed that hatred speech on social media occurs due to the freedom of speech that exists by way of social media channels.

Keywords: freedom of speech, hatred speech, social media, Malaysia, netizens

Procedia PDF Downloads 433
731 Clinical Characteristics of Autistic children Receiving Care in Rehabilitation Centers in Sana'a City, Yemen

Authors: Hamdan Hamood Aldumaini, Amjad Hussein Meqdam, Shamsaldeen kassim Ali, Hamed Mohammed Al-Yousefi, Haron Ahmed Al-Badawi

Abstract:

Background: Autism Spectrum Disorder (ASD) is a complex developmental challenge characterized by significant impairments in social interaction, communication, and behavioral patterns. Diagnosing ASD is challenging due to the lack of definitive medical tests, making early identification crucial. Therefore, increasing people's awareness about autism leads to early diagnosis and better prognosis. Objective: Our study aims to identify the initial symptoms prompting families to seek medical advice, determine the timeline between symptom onset and formal diagnosis, and explore methods for assessing the severity of ASD. Subjects and Methods: The study design employed was a descriptive cross-sectional design, which was suitable for the nature of the research. The data collection took place from March 5, 2022, to April 5, 2022, in Autism Rehabilitation Centers in Sana'a, Yemen. The study population consisted of all children who were diagnosed with autism and visited Autism rehabilitation centers in Sana'a city. The sample size was determined using Epi info version 7, and a total population of 587 autistic children attending the treatment was calculated, but only 250 children were included in this study (176 were male vs. 74 female). Result: In terms of sociability problems, it was found that a significant proportion of Yemeni children with autism experienced difficulties in this area. Specifically, 39.6% were classified as having severe sociability problems, while 28.4% were classified as having moderate issues. Sensory-cognitive awareness problems were also prevalent among the respondents, with 29.6% exhibiting severe difficulties in this domain. Health and physical problems were identified as significant concerns for Yemeni children with autism. The results indicated that 38.4% of the participants experienced severe health and physical issues. Identifying the first symptoms of autism is crucial for early detection and intervention. According to the study, speech delay was the most commonly observed first abnormality, reported by 71.3% of parents. Communication difficulties with others were the second most noticed abnormality, reported by 54.9% of parents. Repetitive movements were the third most commonly observed abnormality, reported by 18% of parents. Regarding the awareness among parents of ASD, our study showed that a significant portion (62%) of parents lack awareness about Autism Spectrum Disorder (ASD) and its causes. Surprisingly, a majority of these parents (over 80%) believe that autism is a curable condition. Additionally, more than half (51.2%) of the parents surveyed reported insufficient knowledge about medication options available to support therapy and rehabilitation for their autistic children.

Keywords: autism characteristics, rehabilitation centres, yemen, children

Procedia PDF Downloads 19
730 Developing Performance Model for Road Side Elements Receiving Periodic Maintenance

Authors: Ayman M. Othman, Hassan Y. Ahmed, Tallat A. Ali

Abstract:

Inadequate maintenance programs and funds allocated for highway networks in the developed countries have led to fast deterioration of road side elements. Therefore, this research focuses on developing a performance model for road side elements periodic maintenance activities. Road side elements that receive periodic maintenance include; earthen shoulder, road signs and traffic markings. Using the level of service concept, the developed model can determine the optimal periodic maintenance intervals for those elements based on a selected level of service suitable with the available periodic maintenance budget. Data related to time periods for progressive deterioration stages for the chosen elements were collected. Ten maintenance experts in Aswan, Sohag and Assiut cities were interviewed for that purpose. Time in months related to 10%, 25%, 40%, 50%, 75%, 90% and 100% deterioration of each road side element was estimated based on the experts opinion. Least square regression analysis has shown that a power function represents the best fit for earthen shoulders edge drop-off and damage of road signs with time. It was also evident that, the progressive dirtiness of road signs could be represented by a quadratic function an a linear function could represent the paint degradation nature of both traffic markings and road signs. Actual measurements of earthen shoulder edge drop-off agree considerably with the developed model.

Keywords: deterioration, level of service, periodic maintenance, performance model, road side element

Procedia PDF Downloads 550
729 Resiliency in Fostering: A Qualitative Study of Highly Experienced Foster Parents

Authors: Ande Nesmith

Abstract:

There is an ongoing shortage of foster parents worldwide to take on a growing population of children in need of out-of-home care. Currently, resources are primarily aimed at recruitment rather than retention. Retention rates are extraordinarily low, especially in the first two years of fostering. Qualitative interviews with 19 foster parents averaging 20 years of service provided insight into the challenges they faced and how they overcame them. Thematic analysis of interview transcripts identified sources of stress and resiliency. Key stressors included lack of support and responsiveness from the children’s social workers, false maltreatment allegations, and secondary trauma from children’s destructive behaviors and emotional dysregulation. Resilient parents connected with other foster parents for support, engaged in creative problem-solving, recognized that positive feedback from children usually arrives years later, and through training, understood the neurobiological impact of trauma on child behavior. Recommendations include coordinating communication between the foster parent licensing agency social workers and the children’s social workers, creating foster parent support networks and mentoring, and continuous training on trauma including effective parenting strategies. Research is needed to determine whether these resilience indicators in fact lead to long-term retention. Policies should include a mechanism to develop a cohesive line of communication and connection between foster parents and the children’s social workers as well as their respective agencies.

Keywords: foster care stability, foster parent burnout, foster parent resiliency, foster parent retention, trauma-informed fostering

Procedia PDF Downloads 330
728 Time-Domain Nuclear Magnetic Resonance as a Potential Analytical Tool to Assess Thermisation in Ewe's Milk

Authors: Alessandra Pardu, Elena Curti, Marco Caredda, Alessio Dedola, Margherita Addis, Massimo Pes, Antonio Pirisi, Tonina Roggio, Sergio Uzzau, Roberto Anedda

Abstract:

Some of the artisanal cheeses products of European Countries certificated as PDO (Protected Designation of Origin) are made from raw milk. To recognise potential frauds (e.g. pasteurisation or thermisation of milk aimed at raw milk cheese production), the alkaline phosphatase (ALP) assay is currently applied only for pasteurisation, although it is known to have notable limitations for the validation of ALP enzymatic state in nonbovine milk. It is known that frauds considerably impact on customers and certificating institutions, sometimes resulting in a damage of the product image and potential economic losses for cheesemaking producers. Robust, validated, and univocal analytical methods are therefore needed to allow Food Control and Security Organisms, to recognise a potential fraud. In an attempt to develop a new reliable method to overcome this issue, Time-Domain Nuclear Magnetic Resonance (TD-NMR) spectroscopy has been applied in the described work. Daily fresh milk was analysed raw (680.00 µL in each 10-mm NMR glass tube) at least in triplicate. Thermally treated samples were also produced, by putting each NMR tube of fresh raw milk in water pre-heated at temperatures from 68°C up to 72°C and for up to 3 min, with continuous agitation, and quench-cooled to 25°C in a water and ice solution. Raw and thermally treated samples were analysed in terms of 1H T2 transverse relaxation times with a CPMG sequence (Recycle Delay: 6 s, interpulse spacing: 0.05 ms, 8000 data points) and quasi-continuous distributions of T2 relaxation times were obtained by CONTIN analysis. In line with previous data collected by high field NMR techniques, a decrease in the spin-spin relaxation constant T2 of the predominant 1H population was detected in heat-treated milk as compared to raw milk. The decrease of T2 parameter is consistent with changes in chemical exchange and diffusive phenomena, likely associated to changes in milk protein (i.e. whey proteins and casein) arrangement promoted by heat treatment. Furthermore, experimental data suggest that molecular alterations are strictly dependent on the specific heat treatment conditions (temperature/time). Such molecular variations in milk, which are likely transferred to cheese during cheesemaking, highlight the possibility to extend the TD-NMR technique directly on cheese to develop a method for assessing a fraud related to the use of a milk thermal treatment in PDO raw milk cheese. Results suggest that TDNMR assays might pave a new way to the detailed characterisation of heat treatments of milk.

Keywords: cheese fraud, milk, pasteurisation, TD-NMR

Procedia PDF Downloads 222
727 Task Validity in Neuroimaging Studies: Perspectives from Applied Linguistics

Authors: L. Freeborn

Abstract:

Recent years have seen an increasing number of neuroimaging studies related to language learning as imaging techniques such as fMRI and EEG have become more widely accessible to researchers. By using a variety of structural and functional neuroimaging techniques, these studies have already made considerable progress in terms of our understanding of neural networks and processing related to first and second language acquisition. However, the methodological designs employed in neuroimaging studies to test language learning have been questioned by applied linguists working within the field of second language acquisition (SLA). One of the major criticisms is that tasks designed to measure language learning gains rarely have a communicative function, and seldom assess learners’ ability to use the language in authentic situations. This brings the validity of many neuroimaging tasks into question. The fundamental reason why people learn a language is to communicate, and it is well-known that both first and second language proficiency are developed through meaningful social interaction. With this in mind, the SLA field is in agreement that second language acquisition and proficiency should be measured through learners’ ability to communicate in authentic real-life situations. Whilst authenticity is not always possible to achieve in a classroom environment, the importance of task authenticity should be reflected in the design of language assessments, teaching materials, and curricula. Tasks that bear little relation to how language is used in real-life situations can be considered to lack construct validity. This paper first describes the typical tasks used in neuroimaging studies to measure language gains and proficiency, then analyses to what extent these tasks can validly assess these constructs.

Keywords: neuroimaging studies, research design, second language acquisition, task validity

Procedia PDF Downloads 114
726 Irrigation Potential Assessment for Eastern Ganga Canal, India Using Geographic Information System

Authors: Deepak Khare, Radha Krishan, Bhaskar Nikam

Abstract:

The present study deals with the results of the Ortho-rectified Cartosat-1 PAN (2.5 m resolution) satellite data analysis for the extraction of canal networks under the Eastern Ganga Canal (EGC) command. Based on the information derived through the remote sensing data, in terms of the number of canals, their physical status and hydraulic connectivity from the source, irrigation potential (IP) created in the command was assessed by comparing with planned/design canal-wise irrigation potentials. All the geospatial information generated in the study is organized in a geodatabase. The EGC project irrigates the command through one main canal, five branch canals, 36 distributaries and 186 minors. The study was conducted with the main objectives of inventory and mapping of irrigation infrastructure using geographic information system (GIS), remote sensing and field data. Likewise, the assessment of irrigation potential created using the mapped infrastructure was performed as on March 2017. Results revealed that the canals were not only pending but were also having gap/s, and hydraulically disconnected in each branch canal and also in minors of EGC. A total of 16622.3 ha of commands were left untouched with canal water just due to the presence of gaps in the EGC project. The sum of all the gaps present in minor canals was 11.92 km, while in distributary, it was 2.63 km. This is a very good scenario that balances IP can be achieved by working on the gaps present in minor canals. Filling the gaps in minor canals can bring most of the area under irrigation, especially the tail reaches command.

Keywords: canal command, GIS, hydraulic connectivity, irrigation potential

Procedia PDF Downloads 125
725 Deep Learning Approach for Chronic Kidney Disease Complications

Authors: Mario Isaza-Ruget, Claudia C. Colmenares-Mejia, Nancy Yomayusa, Camilo A. González, Andres Cely, Jossie Murcia

Abstract:

Quantification of risks associated with complications development from chronic kidney disease (CKD) through accurate survival models can help with patient management. A retrospective cohort that included patients diagnosed with CKD from a primary care program and followed up between 2013 and 2018 was carried out. Time-dependent and static covariates associated with demographic, clinical, and laboratory factors were included. Deep Learning (DL) survival analyzes were developed for three CKD outcomes: CKD stage progression, >25% decrease in Estimated Glomerular Filtration Rate (eGFR), and Renal Replacement Therapy (RRT). Models were evaluated and compared with Random Survival Forest (RSF) based on concordance index (C-index) metric. 2.143 patients were included. Two models were developed for each outcome, Deep Neural Network (DNN) model reported C-index=0.9867 for CKD stage progression; C-index=0.9905 for reduction in eGFR; C-index=0.9867 for RRT. Regarding the RSF model, C-index=0.6650 was reached for CKD stage progression; decreased eGFR C-index=0.6759; RRT C-index=0.8926. DNN models applied in survival analysis context with considerations of longitudinal covariates at the start of follow-up can predict renal stage progression, a significant decrease in eGFR and RRT. The success of these survival models lies in the appropriate definition of survival times and the analysis of covariates, especially those that vary over time.

Keywords: artificial intelligence, chronic kidney disease, deep neural networks, survival analysis

Procedia PDF Downloads 117
724 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 50
723 Determining the Threshold for Protective Effects of Aerobic Exercise on Aortic Structure in a Mouse Model of Marfan Syndrome Associated Aortic Aneurysm

Authors: Christine P. Gibson, Ramona Alex, Michael Farney, Johana Vallejo-Elias, Mitra Esfandiarei

Abstract:

Aortic aneurysm is the leading cause of death in Marfan syndrome (MFS), a connective tissue disorder caused by mutations in fibrillin-1 gene (FBN1). MFS aneurysm is characterized by weakening of the aortic wall due to elastin fibers fragmentation and disorganization. The above-average height and distinct physical features make young adults with MFS desirable candidates for competitive sports; but little is known about the exercise limit at which they will be at risk for aortic rupture. On the other hand, aerobic cardiovascular exercise has been shown to have protective effects on the heart and aorta. We have previously reported that mild aerobic exercise can delay the formation of aortic aneurysm in a mouse model of MFS. In this study, we aimed to investigate the effects of various levels of exercise intensity on the progression of aortic aneurysm in the mouse model. Starting at 4 weeks of age, we subjected control and MFS mice to different levels of exercise intensity (8m/min, 10m/min, 15m/min, and 20m/min, corresponding to 55%, 65%, 75%, and 85% of VO2 max, respectively) on a treadmill for 30 minutes per day, five days a week for the duration of the study. At 24 weeks of age, aortic tissue were isolated and subjected to structural and functional studies using histology and wire myography in order to evaluate the effects of different exercise routines on elastin fragmentation and organization and aortic wall elasticity/stiffness. Our data shows that exercise training at the intensity levels between 55%-75% significantly reduces elastin fragmentation and disorganization, with less recovery observed in 85% MFS group. The reversibility of elasticity was also significantly restored in MFS mice subjected to 55%-75% intensity; however, the recovery was less pronounced in MFS mice subjected to 85% intensity. Furthermore, our data shows that smooth muscle cells (SMCs) contractilion in response to vasoconstrictor agent phenylephrine (100nM) is significantly reduced in MFS aorta (54.84 ± 1.63 mN/mm2) as compared to control (95.85 ± 3.04 mN/mm2). At 55% of intensity, exercise did not rescue SMCs contraction (63.45 ± 1.70 mN/mm2), while at higher intensity levels, SMCs contraction in response to phenylephrine was restored to levels similar to control aorta [65% (81.88 ± 4.57 mN/mm2), 75% (86.22 ± 3.84 mN/mm2), and 85% (83.91 ± 5.42 mN/mm2)]. This study provides the first time evidence that high intensity exercise (e.g. 85%) may not provide the most beneficial effects on aortic function (vasoconstriction) and structure (elastin fragmentation, aortic wall elasticity) during the progression of aortic aneurysm in MFS mice. On the other hand, based on our observations, medium intensity exercise (e.g. 65%) seems to provide the utmost protective effects on aortic structure and function in MFS mice. These findings provide new insights into the potential capacity, in which MFS patients could participate in various aerobic exercise routines, especially in young adults affected by cardiovascular complications particularly aortic aneurysm. This work was funded by Midwestern University Research Fund.

Keywords: aerobic exercise, aortic aneurysm, aortic wall elasticity, elastin fragmentation, Marfan syndrome

Procedia PDF Downloads 364
722 Distributed System Computing Resource Scheduling Algorithm Based on Deep Reinforcement Learning

Authors: Yitao Lei, Xingxiang Zhai, Burra Venkata Durga Kumar

Abstract:

As the quantity and complexity of computing in large-scale software systems increase, distributed system computing becomes increasingly important. The distributed system realizes high-performance computing by collaboration between different computing resources. If there are no efficient resource scheduling resources, the abuse of distributed computing may cause resource waste and high costs. However, resource scheduling is usually an NP-hard problem, so we cannot find a general solution. However, some optimization algorithms exist like genetic algorithm, ant colony optimization, etc. The large scale of distributed systems makes this traditional optimization algorithm challenging to work with. Heuristic and machine learning algorithms are usually applied in this situation to ease the computing load. As a result, we do a review of traditional resource scheduling optimization algorithms and try to introduce a deep reinforcement learning method that utilizes the perceptual ability of neural networks and the decision-making ability of reinforcement learning. Using the machine learning method, we try to find important factors that influence the performance of distributed system computing and help the distributed system do an efficient computing resource scheduling. This paper surveys the application of deep reinforcement learning on distributed system computing resource scheduling proposes a deep reinforcement learning method that uses a recurrent neural network to optimize the resource scheduling, and proposes the challenges and improvement directions for DRL-based resource scheduling algorithms.

Keywords: resource scheduling, deep reinforcement learning, distributed system, artificial intelligence

Procedia PDF Downloads 90
721 Towards Green(er) Cities: The Role of Spatial Planning in Realising the Green Agenda

Authors: Elizelle Juaneé Cilliers

Abstract:

The green hype is becoming stronger within various disciplines, modern practices and academic thinking, enforced by concepts such as eco-health, eco-tourism, eco-cities, and eco-engineering. There is currently also an expanded scientific understanding regarding the value and benefits relating to green infrastructure, for both communities and their host cities, linked to broader sustainability and resilience thinking. The integration and implementation of green infrastructure as part of spatial planning approaches and municipal planning, are, however, more complex, especially in South Africa, inflated by limitations of budgets and human resources, development pressures, inequities in terms of green space availability and political legacies of the past. The prevailing approach to spatial planning is further contributing to complexity, linked to misguided perceptions of the function and value of green infrastructure. As such, green spaces are often considered a luxury, and green infrastructure a costly alternative, resulting in green networks being susceptible to land-use changes and under-prioritized in local authority decision-making. Spatial planning, in this sense, may well be a valuable tool to realise the green agenda, encapsulating various initiatives of sustainability as provided by a range of disciplines. This paper aims to clarify the importance and value of green infrastructure planning as a component of spatial planning approaches, in order to inform and encourage local authorities to embed sustainability thinking into city planning and decision-making approaches. It reflects on the decisive role of land-use management to guide the green agenda and refers to some recent planning initiatives. Lastly, it calls for trans-disciplinary planning approaches to build a case towards green(er) cities.

Keywords: green infrastructure, spatial planning, transdisciplinary, integrative

Procedia PDF Downloads 231
720 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 22
719 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation

Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez

Abstract:

With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).

Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling

Procedia PDF Downloads 174
718 Budget Optimization for Maintenance of Bridges in Egypt

Authors: Hesham Abd Elkhalek, Sherif M. Hafez, Yasser M. El Fahham

Abstract:

Allocating limited budget to maintain bridge networks and selecting effective maintenance strategies for each bridge represent challenging tasks for maintenance managers and decision makers. In Egypt, bridges are continuously deteriorating. In many cases, maintenance works are performed due to user complaints. The objective of this paper is to develop a practical and reliable framework to manage the maintenance, repair, and rehabilitation (MR&R) activities of Bridges network considering performance and budget limits. The model solves an optimization problem that maximizes the average condition of the entire network given the limited available budget using Genetic Algorithm (GA). The framework contains bridge inventory, condition assessment, repair cost calculation, deterioration prediction, and maintenance optimization. The developed model takes into account multiple parameters including serviceability requirements, budget allocation, element importance on structural safety and serviceability, bridge impact on network, and traffic. A questionnaire is conducted to complete the research scope. The proposed model is implemented in software, which provides a friendly user interface. The framework provides a multi-year maintenance plan for the entire network for up to five years. A case study of ten bridges is presented to validate and test the proposed model with data collected from Transportation Authorities in Egypt. Different scenarios are presented. The results are reasonable, feasible and within acceptable domain.

Keywords: bridge management systems (BMS), cost optimization condition assessment, fund allocation, Markov chain

Procedia PDF Downloads 273
717 Photoemission Momentum Microscopy of Graphene on Ir (111)

Authors: Anna V. Zaporozhchenko, Dmytro Kutnyakhov, Katherina Medjanik, Christian Tusche, Hans-Joachim Elmers, Olena Fedchenko, Sergey Chernov, Martin Ellguth, Sergej A. Nepijko, Gerd Schoenhense

Abstract:

Graphene reveals a unique electronic structure that predetermines many intriguing properties such as massless charge carriers, optical transparency and high velocity of fermions at the Fermi level, opening a wide horizon of future applications. Hence, a detailed investigation of the electronic structure of graphene is crucial. The method of choice is angular resolved photoelectron spectroscopy ARPES. Here we present experiments using time-of-flight (ToF) momentum microscopy, being an alternative way of ARPES using full-field imaging of the whole Brillouin zone (BZ) and simultaneous acquisition of up to several 100 energy slices. Unlike conventional ARPES, k-microscopy is not limited in simultaneous k-space access. We have recorded the whole first BZ of graphene on Ir(111) including all six Dirac cones. As excitation source we used synchrotron radiation from BESSY II (Berlin) at the U125-2 NIM, providing linearly polarized (both polarizations p- and s-) VUV radiation. The instrument uses a delay-line detector for single-particle detection up the 5 Mcps range and parallel energy detection via ToF recording. In this way, we gather a 3D data stack I(E,kx,ky) of the full valence electronic structure in approx. 20 mins. Band dispersion stacks were measured in the energy range of 14 eV up to 23 eV with steps of 1 eV. The linearly-dispersing graphene bands for all six K and K’ points were simultaneously recorded. We find clear features of hybridization with the substrate, in particular in the linear dichroism in the angular distribution (LDAD). Recording of the whole Brillouin zone of graphene/Ir(111) revealed new features. First, the intensity differences (i.e. the LDAD) are very sensitive to the interaction of graphene bands with substrate bands. Second, the dark corridors are investigated in detail for both, p- and s- polarized radiation. They appear as local distortions of photoelectron current distribution and are induced by quantum mechanical interference of graphene sublattices. The dark corridors are located in different areas of the 6 Dirac cones and show chirality behaviour with a mirror plane along vertical axis. Moreover, two out of six show an oval shape while the rest are more circular. It clearly indicates orientation dependence with respect to E vector of incident light. Third, a pattern of faint but very sharp lines is visible at energies around 22eV that strongly remind on Kikuchi lines in diffraction. In conclusion, the simultaneous study of all six Dirac cones is crucial for a complete understanding of dichroism phenomena and the dark corridor.

Keywords: band structure, graphene, momentum microscopy, LDAD

Procedia PDF Downloads 323
716 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 15
715 The Role of Bridging Stakeholder in Water Management: Examining Social Networks in Working Groups and Co-Management

Authors: Fariba Ebrahimi, Mehdi Ghorbani

Abstract:

Comprehensive water management considers economic, environmental, technical and social sustainability of water resources for future generations. Integrated water management implies cooperative approach and involves all stakeholders and also introduces issues to managers and decision makers. Solving these issues needs integrated and system approach according to the recognition of actors or key persons in necessary to apply cooperative management of water resources. Therefore, social network analysis can be used to demonstrate the most effective actors for environmental base decisions. The linkage of diverse sets of actors and knowledge systems across management levels and institutional boundaries often poses one of the greatest challenges in adaptive water management. Bridging stakeholder can facilitate interactions among actors in management settings by lowering the transaction costs of collaboration. This research examines how network connections between group members affect in co- management. Cohesive network structures allow groups to more effectively achieve their goals and objectives Strong; centralized leadership is a better predictor of working group success in achieving goals and objectives. Finally, geometric position of each actor was illustrated in the network. The results of the research based on between centrality index have a key and bridging actor in recognition of cooperative management of water resources in Darbandsar village and also will help managers and planners of water in the case of recognition to organization and implementation of sustainable management of water resources and water security.

Keywords: co-management, water management, social network, bridging stakeholder, darbandsar village

Procedia PDF Downloads 285
714 Resilience with Spontaneous Volunteers in Disasters-Coordination Using an It System

Authors: Leo Latasch, Mario Di Gennaro

Abstract:

Introduction: The goal of this project was to increase the resilience of the population as well as rescue organizations to make both quality and time-related improvements in handling crises. A helper network was created for this purpose. Methods: Social questions regarding the structure and purpose of helper networks were considered - specifically with regard to helper motivation, the level of commitment and collaboration between populations and agencies. The exchange of information, the coordinated use of volunteers, and the distribution of available resources will be ensured through defined communication and cooperation routines. Helper smartphones will also be used provide a picture of the situation on the ground. Results: The helper network was established and deployed based on the RESIBES information technology system. It consists of a service platform, a web portal and a smartphone app. The service platform is the central element for collaboration between the various rescue organizations, as well as for persons, associations, and companies from the population offering voluntary aid. The platform was used for: Registering helpers and resources and then requesting and assigning it in case of a disaster. These services allow the population's resources to be organized. The service platform also allows for a secure data exchange between services and external systems. Conclusions: The social and technical work priorities have allowed us to cover a full cycle of advance structural work, gaining an overview, damage management, evaluation, and feedback on experiences. This cycle allows experiences gained while handling the crisis to feed back into the cycle and improve preparations and management strategies.

Keywords: coordination, disaster, resilience, volunteers

Procedia PDF Downloads 120
713 A Comparative Study on Deep Learning Models for Pneumonia Detection

Authors: Hichem Sassi

Abstract:

Pneumonia, being a respiratory infection, has garnered global attention due to its rapid transmission and relatively high mortality rates. Timely detection and treatment play a crucial role in significantly reducing mortality associated with pneumonia. Presently, X-ray diagnosis stands out as a reasonably effective method. However, the manual scrutiny of a patient's X-ray chest radiograph by a proficient practitioner usually requires 5 to 15 minutes. In situations where cases are concentrated, this places immense pressure on clinicians for timely diagnosis. Relying solely on the visual acumen of imaging doctors proves to be inefficient, particularly given the low speed of manual analysis. Therefore, the integration of artificial intelligence into the clinical image diagnosis of pneumonia becomes imperative. Additionally, AI recognition is notably rapid, with convolutional neural networks (CNNs) demonstrating superior performance compared to human counterparts in image identification tasks. To conduct our study, we utilized a dataset comprising chest X-ray images obtained from Kaggle, encompassing a total of 5216 training images and 624 test images, categorized into two classes: normal and pneumonia. Employing five mainstream network algorithms, we undertook a comprehensive analysis to classify these diseases within the dataset, subsequently comparing the results. The integration of artificial intelligence, particularly through improved network architectures, stands as a transformative step towards more efficient and accurate clinical diagnoses across various medical domains.

Keywords: deep learning, computer vision, pneumonia, models, comparative study

Procedia PDF Downloads 37
712 Pentosan Polysulfate Sodium: A Potential Treatment to Improve Bone and Joint Manifestations of Mucopolysaccharidosis I

Authors: Drago Bratkovic, Curtis Gravance, David Ketteridge, Ravi Krishnan, Michael Imperiale

Abstract:

The mucopolysaccharidoses (MPSs) are a group of lysosomal storage diseases that have a common defect in the catabolism of glycosaminoglycans (GAGs). MPS I is the most common of the MPS diseases. Manifestations of MPS I include coarsening of facial features, corneal clouding, developmental delay, short stature, skeletal manifestations, hearing loss, cardiac valve disease, hepatosplenomegaly, and umbilical and inguinal hernias. Treatments for MPS I restore or activate the missing or deficient enzyme in the case of enzyme replacement therapy (ERT) and haematopoietic stem cell transplantation (HSCT). Pentosan polysulfate sodium (PPS) is a potential treatment to improve bone and joint manifestations of MPS I. The mechanisms of action of PPS that are relevant to the treatment of MPS I are the ability to: (i) Reduce systemic and accumulated GAG, (ii) Reduce inflammatory effects via the inhibition of NF-kB, resulting in the reduction in pro-inflammatory mediators. (iii) Reduce the expression of the pain mediator nerve growth factor in osteocytes from degenerating joints. (iv) Inhibit the cartilage degrading enzymes related to joint dysfunction in MPS I. PPS is being evaluated as an adjunctive therapy to ERT and/or HSCT in an open-label, single-centre, phase 2 study. Patients are ≥ 5 years of age with a diagnosis of MPS I and previously received HSCT and/or ERT. Three white, female, patients with MPS I-Hurler, ages 14, 15, and 19 years, and one, white male patient aged 15 years are enrolled. All were diagnosed at ≤2 years of age. All patients received HSCT ≤ 6 months after diagnosis. Two of the patients were treated with ERT prior to HSCT, and 1 patient received ERT commencing 3 months prior to HSCT. Two patients received 0.75mg/kg and 2 patients received 1.5mg/kg of PPS. PPS was well tolerated at doses of 0.75 and 1.5 mg/kg to 47 weeks of continuous dosing. Of the 19 adverse events (AEs), 2 were related to PPS. One AE was moderate (pre-syncope) and 1 was mild (injection site bruising), experienced in the same patient. All AEs were reported as mild or moderate. There have been no SAEs. One subject experienced a COVID-19 infection and PPS was interrupted. The MPS I signature GAG fragments, sulfated disaccharide and UA-HNAc S, tended to decrease in 3 patients from baseline through Week 25. Week 25 GAG data are pending for the 4th patient. Overall, most biomarkers (inflammatory, cartilage degeneration, and bone turnover) evaluated in the 3 patients with 25-week assessments have indicated either no change or a reduction in levels compared to baseline. In 3 patients, there was a trend toward improvement in the 2MWT from baseline to Week 48 with > 100% increase in 1 patient (01-201). In the 3 patients that had Week 48 assessments, patients and proxies reported improvement in PGIC, including “worthwhile difference” (n=1), or “made all the difference” (n=2).

Keywords: MPS I, pentosan polysulfate sodium, clinical study, 2MWT, QoL

Procedia PDF Downloads 96
711 The Development of Communication and Mobile Phones in Iran: The Role of Internet in Smart Mobile Phones in Social and Human Development and Social Mobility of Different Classes of Iranian Women

Authors: Zahra Tork

Abstract:

Before the spread of the Internet and the use of mobile phones, women were generally far from society and many restrictions were applied to them, but after the spread of the Internet and the cultural and social changes brought about by it, women in society got a new one and many restrictions regarding them disappeared; As we can see today, many women, like men, have a high social base, they earn for themselves, they can travel alone, stay out late at night, take personal and family photos or videos on virtual pages. Publish themselves (while before this, showing or publishing photos of women was considered dishonorable or indecent). In this article, an attempt is made to examine the effect of the internet on mobile phones and virtual social networks in changing beliefs, norms and social values and their relationship with the social mobility of women and the effect of these factors on social and human development be paid. For this reason, social and human development is discussed first, and then the role of the media in development is explained, and finally, the social mobility of women is discussed. Since the purpose of this study is to better understand the social mobility of Iranian women through the development of the Internet in mobile phones, a qualitative study using focus groups has been adopted. The results of this research indicated that the Internet has caused changes in the value and cultural system of the Iranian people, and women have also redefined their roles and identity. In this new definition, many of the past restrictions have disappeared and women have gained the same freedoms as men. Finally, these factors (change in values and norms and redefinition of the role of women) joined hands and caused the social mobility of women in Iran.

Keywords: development of communication in Iran, development of mobile phones, development of the Internet, women's social group, social mobility

Procedia PDF Downloads 58
710 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 500